JP4646509B2 - Information storage server and information storage program - Google Patents

Information storage server and information storage program Download PDF

Info

Publication number
JP4646509B2
JP4646509B2 JP2003366574A JP2003366574A JP4646509B2 JP 4646509 B2 JP4646509 B2 JP 4646509B2 JP 2003366574 A JP2003366574 A JP 2003366574A JP 2003366574 A JP2003366574 A JP 2003366574A JP 4646509 B2 JP4646509 B2 JP 4646509B2
Authority
JP
Japan
Prior art keywords
user
authentication
information
means
contact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2003366574A
Other languages
Japanese (ja)
Other versions
JP2005128970A (en
Inventor
一泰 小倉
Original Assignee
東芝テック株式会社
株式会社東芝
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 東芝テック株式会社, 株式会社東芝 filed Critical 東芝テック株式会社
Priority to JP2003366574A priority Critical patent/JP4646509B2/en
Publication of JP2005128970A publication Critical patent/JP2005128970A/en
Application granted granted Critical
Publication of JP4646509B2 publication Critical patent/JP4646509B2/en
Application status is Expired - Fee Related legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Use of an alias or a single-use code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing
    • G06Q20/4097Mutual authentication between card and transaction partners
    • G06Q20/40975Use of encryption for mutual authentication

Description

  The present invention relates to an information storage server and an information storage program. For example, the present invention is suitable for application to a case where content provided by a content provider is stored in a virtual print server and supplied to each user upon request. It is.

  Conventionally, as techniques for taking measures when a cash card is lost or the like, there are those described in Patent Documents 1 and 2 below.

  Among them, in the technique of Patent Document 1, a user who has noticed the loss or theft of a cash card, passbook, credit card, etc. operates a cash dispenser to stop the financial transaction using the cash card or the like. It is possible to apply, thereby preventing unauthorized financial transactions by third parties.

In the technique of Patent Document 2, the agency station automatically issues a card stop instruction based on personal card possession information and card company information that is always managed in the latest state. According to this, even when a plurality of cards are lost at the same time by losing a bag or a wallet, the card can be quickly stopped without omission.
JP 2003-85620 A JP 2002-32694 A

  However, although the techniques of Patent Documents 1 and 2 described above can reduce the possibility that a lost cash card can be used illegally by a third party, a legitimate user who has lost the card or the like can use the card or the like. If you have a mobile phone, you will not be able to receive services such as financial transactions that you would have been able to receive, and it can be said that availability and convenience are low.

In order to solve this problem, according to the first aspect of the present invention, content specified by a user is stored in a content storage unit, and when a content output request is received from the user, the main authentication means sends the main authentication information from the user. Is acquired in a method defined in advance for main authentication, and main authentication is performed to collate with internally managed main authentication information. When a positive authentication result is obtained, the content is output to the content output terminal. In the information storage server that executes the service provided to the user via the Internet, (1) the alternative authentication information is taken in from the user in a method determined in advance for verification and checked against the internally managed alternative authentication information A plurality of alternative authentication means capable of executing alternative authentication, wherein the alternative authentication information is different, or the method of fetching the alternative authentication information from the user is different; and (2) the user , When making an output request, when selecting to use any of the alternative authentication means instead of the main authentication means, the selected alternative authentication means is authenticated as valid instead of the main authentication means. An alternative authentication selection means, and (3) a release including at least a start date and time for releasing the revocation and information to be inputted when the main authentication means revokes the main authentication information used in the main authentication A release condition specifying means for specifying a condition; and (4) a revocation canceling means for canceling the revocation status of the main authentication information when the release condition is satisfied .

The second aspect of the present invention is installed in a computer constituting an information storage server that stores a content specified by a user and provides a service for transmitting the content to a content output terminal in response to an output request from the user. An information storage program to be executed by the computer, wherein (1) main authentication information is fetched from a user in a method predetermined for main authentication and checked against main authentication information managed internally. Main authentication means for executing authentication, and (2) taking alternative authentication information from a user in a predetermined method for alternative authentication and executing alternative authentication for collating with internally managed alternative authentication information A plurality of alternative authentication means that have different alternative authentication information or different methods for fetching alternative authentication information from the user, and (3) the user requests output. To, when one of said alternative authentication means selects to use instead of the main authentication means, and alternative authentication selecting means for authentication as a valid instead the alternative authentication means selected in the main authentication means (4) When the main authentication means revokes the main authentication information used in the main authentication, the release specifying the release condition including at least the start date and time to cancel the revocation and the information to be input when canceling the revocation a condition specifying unit, characterized by (5) the when the release condition is satisfied, be made to function as a revocation canceling means for canceling the revocation status of the main authentication information.

  According to the present invention, availability and convenience are enhanced.

(A) Embodiment Hereinafter, an embodiment will be described by taking as an example a case where an information storage server and an information storage program according to the present invention are applied to a virtual print system.

  The virtual print system is a system centered on a virtual print server arranged on the Internet, and a content use member registered as a member in this system can use content provided by the virtual print service. In the virtual print service, each content member uses a mobile phone carried by himself / herself, and obtains a desired image from an MMK (multimedia kiosk) terminal installed at a place where many people gather, such as a convenience store or a station. Print output and screen display output can be received. It goes without saying that the screen display output of the content may be performed from the mobile phone instead of the MMK terminal as necessary.

  The members of the virtual print server include content providing members who operate content servers to be described later and are content providing sources in addition to the content using members, but this embodiment is mainly intended for content using members. Is. Hereinafter, the content using member is simply referred to as “user”.

(A-1) Configuration of First Embodiment FIG. 3 shows an example of the overall configuration of the virtual print system 10 of the present embodiment.

  In FIG. 3, the virtual print system 10 includes a print data registration PC (personal computer) 11, an ID reader 12, a virtual print server 13, an information terminal (MMK terminal) 14, and an MFP (multifunction machine) 15. A mobile phone 16, an ID output device 17, and an alternative authentication means 17A.

  Of these, the mobile phone 16 directly belongs to a mobile phone network operated by a predetermined mobile phone operator, but can communicate with the virtual print server 13 via the mobile phone network and the Internet. . The mobile phone 16 is carried and used by a user U1 who is one of the users.

  Since the MMK terminals are distributed at a high density at least in a place where many people in the urban area gather, the user U1 can change his current position according to the message exchange performed between the virtual print server 13 and the mobile phone 16. A desired MMK terminal (for example, 14) is selected from a plurality of MMK terminals existing in the vicinity. In response to this selection, the virtual print server 13 and the corresponding MMK terminal prepare for prompt output (screen display output or print output) of the content requested by the user U1. When moving to a selected MMK terminal (for example, 14) and performing a predetermined operation, it is also preferable that the procedure is such that the image is immediately output from the MMK terminal.

  In the configuration of the present embodiment, it is assumed that the mobile phone 16 includes a web browser, a mailer, and a camera. Among these, the Web browser displays a Web page provided by the Web server function of the virtual print server 13 on the screen, or uses the form (a type of Web page) displayed on the screen to input information input by the user U1 to the virtual print server. Used to communicate to 13.

  The camera is used for photographing a QR code (two-dimensional barcode), which will be described later, and the mailer is used for transmitting an electronic mail including the photographing result to a corresponding mail address in the virtual print server 13.

Specifically, the information terminal 14 is the above-described MMK (multimedia kiosk) terminal. Although only one user U1 and one MMK terminal 14 are shown in FIG. 3 , usually a large number of users are registered in the virtual print server 13, and these users are sent from the MMK terminals to the virtual print server. The virtual print service provided by 13 is used. Complementing the function of the mobile phone 16 having a small display screen and no print output function, a large-size and high-definition screen display output or print output is performed in the vicinity of the destination of the user U1, and virtual printing is performed. In order to increase the effectiveness of the service, it is necessary to distribute a large number of MMK terminals at a high density.

  However, in the following, description will be given mainly taking the case where the user U1 uses the MMK terminal 14 as an example.

  The virtual print server 13 stores for the user U1 what is designated by the user U1 from the content group provided by a content server (not shown), and the user U1 operates the MMK terminal 14. If requested, the stored content is transmitted and output (print output or screen display output) from the MMK terminal 14.

  Since the mobile phone 16 also has a screen display function, if the content is of a small size (number of bits) for the mobile phone, it can be displayed on the screen of the mobile phone 16. . However, since the screen of the mobile phone 16 is small in size, it is often convenient for the user U1 to display it on the screen of the larger MMK terminal 14. Further, since the mobile phone 16 does not have a printing function, it is necessary to use the MMK terminal 14 to print out the content at a desired place such as a place where the user is away. This is because the MMK terminal 14 has a printing function.

  Although the MMK terminal itself may have a built-in print function, in the example of FIG. 3, the print function of the MFP 15 connected to the outside is used.

  The MFP 15 is an information processing apparatus equipped with at least two functions among a copy function, a facsimile function, and a print function. Among these, the copy function and the facsimile function include a scanner function for reading an arbitrary image or character string written on paper, so that the MFP 15 also has a scanner function. If necessary, all the functions of the MFP 15 may be incorporated in the MMK terminal 14.

  The MMK terminal 14 is also connected with an ID reader 12 outside thereof.

  The ID reader 12 exchanges signals with the ID output device 17 carried by the user U1 to obtain personal information (authenticated by the virtual print server 13 based on the personal information) from the ID output device 17. This is a device having a function of supplying to the MMK terminal 14. The function of the ID reader 12 may also be built in the MMK terminal 14.

  Therefore, the ID output device 17 has a function of outputting personal information of the user U1 through the exchange of signals with the ID reader 12.

  The function of the ID reader 12 needs to correspond to the function of the ID output device 17.

  The ID output device 17 may be prepared for a virtual print service, or a general-purpose device (for example, a credit card) used for other services may be used in the virtual print service. The ID output device 17 may be any device as long as it can output the personal information of the user U1 when necessary, and therefore various ID output devices 17 are used. Can do. For example, a non-contact IC card or the like having a function of outputting personal information of the user U1 may be used as the ID output device 17.

  The print data registration PC (personal computer) 11 is an information processing apparatus operated by the user U1 when the virtual print server 13 stores the content. This content may be selected by the user U1 using the print data registration PC 11 from the content group provided by the above-described content server, and created by the user U1 using the print data registration PC 11 It may be content.

  Note that if the content to be registered in the virtual print server 13 is simply selected from the content group provided from the content server, the mobile phone 16 can be used in place of the print data registration PC 11.

  Of course, an information processing apparatus other than a personal computer may be used as the print data registration PC 11.

  The virtual print server 13 stores various data such as print data DT1, user management data DT2, and authentication data DT3 in order to provide a membership-based virtual print service.

  The internal configuration of the mobile phone 16 carried by the user U1 is, for example, as shown in FIG. Further, the internal configurations of the MMK terminal 14, the print data registration PC 11, and the ID output device 17 may be the same as long as they are shown in the illustrated level of detail. However, in the case of the MMK terminal 14, the MFP 15 is attached as described above. Further, when the ID output device 17 is a non-contact IC card or the like, it is normal that there is no user interface for the user U1, so that an operation unit 22 and a display unit 23 to be described later are unnecessary.

(A-1-1) Internal Configuration Example of Mobile Phone In FIG. 2, the mobile phone 16 includes a communication unit 20, a control unit 21, an operation unit 22, a display unit 23, and a storage unit 24. Yes.

  Of these, the communication unit 20 is a part that functions mainly for communication with the virtual print server 13 via the Internet and a mobile phone network. In addition, communication with the content server is performed via the Internet and a mobile phone network as necessary.

  When the MMK terminal 14 is viewed in FIG. 2, the communication unit 20 performs communication with the MFP 15 and communication with the ID reader 12 in addition to communication with the virtual print server 13. Will also be prepared. 2, when the ID output device 17 is the non-contact IC card, the communication unit 20 performs wireless communication with the ID reader 12. This wireless communication may use a magnetic field in addition to radio waves.

  The control unit 21 corresponds to a CPU (central processing unit) of the mobile phone 16 in terms of hardware, and corresponds to various programs such as an OS (operating system), a Web browser, and a mailer in terms of software. . In the present embodiment, basically, when content transmitted from the virtual print server 13 is displayed on the screen of the mobile phone 16, various notifications are exchanged with the virtual print server 13 using a Web browser. If so, e-mail or a web browser is used.

  The operation unit 22 is a part operated by the user U1 who uses the mobile phone 16. In the case of a mobile phone, the operation unit 22 has a much smaller size and fewer operation keys than a keyboard of a personal computer (for example, 11). However, when viewing the MMK terminal 14 in FIG. 2, the operation unit 22 is much larger than the mobile phone and has a sufficient number of operation keys, so that the operability is higher than that of the mobile phone 16.

  The display unit 23 corresponds to a display device (for example, an LCD (liquid crystal display device)) that displays a screen for the user U1 to view, and constitutes a user interface together with the operation unit 22. When the content is transmitted from the virtual print server 13 to the mobile phone 16, the user U <b> 1 browses the content of the content via the display unit 23. The screen display on the display unit 23 is executed according to the functions of the Web browser and the mailer. Due to the nature of mobile phones that require portability, the body size of the mobile phone 16 is reduced, and the screen size of the display unit 23 is inevitably smaller than that of a personal computer (for example, 11).

  On the other hand, in the case of the MMK terminal 14, since it is installed and used in a fixed manner and does not require portability, the screen size of the display unit 23 is much larger than that of the mobile phone 16. . Therefore, the mobile phone 16 can accurately display on the MMK terminal 14 even an image that is difficult to display accurately or an image that cannot be displayed because the number of bits is too large.

  The storage unit 24 is a storage resource constituted by a RAM (Random Access Memory), a hard disk or the like in terms of hardware, and various files can be included in this part in terms of software. Program files such as the web browser and mailer, and files containing the content are examples of such files, and the physical entities of these files are located in the storage unit 24.

  On the other hand, the internal configuration of the virtual print server 13 that communicates with the mobile phone 16 via the Internet and a mobile phone network may be, for example, as shown in FIG. The virtual print server 13 communicates with the content server and the MMK terminal 14 in addition to the mobile phone 16.

(A-1-2) Internal Configuration Example of Virtual Print Server In FIG. 1, the virtual print server 13 includes a communication unit 30, a control unit 31, a main authentication unit 32, an alternative authentication unit 33, and a storage unit 34. And.

  Of these, the communication unit 30 corresponds to the communication unit 20, the control unit 31 corresponds to the control unit 21, and the storage unit 34 corresponds to the storage unit 24.

  However, since the virtual print server 13 provides the server function, the control unit 31 is equipped with various server functions such as Web server software instead of the Web browser. In addition, the control unit 31 can be loaded with a CGI program, an application program for Web service, and the like.

  Furthermore, since the virtual print server 13 communicates with the content server and the MMK terminal 14 in addition to the mobile phone 16, the communication unit 30 needs to be compatible with such communication.

  In the storage unit 34, user management data DT2 for managing registered members (U1 is one of them) registered by the virtual print server 13, contents (print data) DT1 stored for each user (for example, U1) The authentication data DT3 used for authenticating each member is also stored.

  Various data stored in the virtual print server 13 including these data DT1 to DT3 can be registered in the relational database DB1 having the structure shown in FIG. FIG. 4 is a diagram corresponding to the ER model (ER diagram). The description by the ER model can be converted into various data models (DBMS), but FIG. 4 shows the state converted into a relational data model which is one of the data models. Therefore, in FIG. 4, a relationship table is associated with each entity.

  In FIG. 4, the entity (E) includes related information, user, print data, authentication, substitute authentication, and resumption information, and an attribute is associated with each entity. Each entity can be expressed by a table (relational table) whose attributes are data items.

  For example, the authentication table TB13 corresponding to authentication, which is one of the entities, includes a user ID (UserID), an authentication method, and authentication data as data items. The above-described authentication data DT3 is data corresponding to this data item “authentication data”. Here, the user ID of the user U1 is IDU1.

  In each table TB11 to TB16, FK (here, FK1) indicates that the data item is a foreign key (foreign key), and PK indicates that the data item is a primary key (primary key). Show. The primary key is a data item that can uniquely specify each row in the table. Here, a row describes an actual value related to each data item, and when each data item is arranged horizontally according to a general table expression format, one or more are registered in the table. This is the horizontal line. Rows are omitted in the tables TB11 to TB16 in FIG.

  A foreign key is a data item that is a primary key of another table. In FIG. 4, the user ID is used as an external key in all the tables TB12 to TB16 other than the table TB11.

  The storage unit 34 storing the database DB1 also provides various types of information necessary for the components 30 to 32 in the virtual print server 13 to execute processing, a working storage area, and the like.

  The main authentication unit 32 is a part that performs main authentication (main authentication) for a user who accesses the virtual print server 13 using the mobile phone 16 or the MMK terminal 14. When executing the main authentication, the main authentication unit 32 follows the registered contents of the authentication table TB13.

  In main authentication, authentication is executed based on personal information output from the ID output device 17. Various information can be used as the personal information. When a password is used as the authentication data of the authentication table TB13, for example, the personal information can be a user ID and a password.

  It is the authentication method in the authentication table TB13 that defines the specific procedure for performing authentication using such a user ID and password. Various authentication methods can be used. For example, when a one-time password method is used, the following procedure can be used.

  That is, when an authentication request message (a user ID is included in this message) arrives from the ID output device 17, a random number is generated and transmitted on the virtual print server 13 side, and the MMK terminal 14 and the ID reader 12 are connected. The ID output device 17 that has received the random number transmits the result of multiplying the random number and the password, and the virtual print server 13 that has received the multiplication result divides the multiplication result by the random number, Authentication is performed by checking whether or not it matches the password of the user U1 registered in advance.

  In this procedure, since it is a multiplication result that is actually transmitted between the ID reader 12 and the ID output device 17 and between the MMK terminal 14 and the virtual print server 13 (including the Internet), it is a plaintext. The password can be prevented from being intercepted by a third party. The value of the random number can be changed every time an authentication request message arrives.

  The main authentication unit 32 normally executes processing corresponding to the authentication method (procedure) in the virtual print server 13.

  For example, in the case of the one-time password method, the main authentication unit 32 performs generation of the random number, division of the multiplication result, and verification of the password registered in advance with the division result.

The alternative authentication unit 33 is a part that executes alternative authentication used when the normal authentication executed by the main authentication unit 32 cannot be performed. For example, if the user U1, who forgets main authentication if you lose the non-contact IC card (ID output device 17) to be used, the password for the main authentication has been stored, the finger used in the main authentication biometric system It is necessary to perform alternative authentication in the event of injury . The alternative authentication unit 33 executes alternative authentication based on the registered contents of the alternative authentication table TB14.

  The structure of the alternative authentication table TB14 corresponds to the authentication table TB13. That is, the user ID of the alternative authentication table TB14 corresponds to the user ID of the authentication table TB13, the alternative authentication method of the alternative authentication table TB14 corresponds to the authentication method of the authentication table TB13, and the alternative authentication data of the alternative authentication table TB14 is the authentication table. It corresponds to the authentication data of TB13.

  As long as the alternative authentication unit 33 executes alternative authentication according to the registration contents of the alternative authentication table TB14, the function of the alternative authentication unit 33 itself basically corresponds to the main authentication unit 32. At least one of personal information and an authentication method (procedure) used for authentication is different from authentication by the main authentication unit 32. This authentication method also reflects differences in devices used for authentication (for example, the ID output device 17).

  Although only one alternative authentication method may be prepared, it is also desirable to prepare a plurality of alternative authentication methods so that the user U1 can select.

  When performing alternative authentication, the user U1 uses an alternative authentication means 17A capable of outputting his / her personal information in place of the ID output device 17.

Various alternative authentication means 17A can be used. For example, an employee card, a license card, a business card, a commuter pass, a Juki card, an IC card license, a credit card, a cash card, a point card, a mobile phone 16, etc., are usually worn by the user U1, and other users ( It is also preferable to use, as the alternative authentication means 17A, an article having an ability (identification ability) to discriminate between the user U1 and other legitimate users or a third party who attempts unauthorized access to the virtual print server 13. The employee card, driver's license, business card, commuter pass, and the like use the result obtained by reading the image with the scanner of the MFP 15 as personal information for authentication.

  In addition, personal information can be easily read mechanically from Juki cards, IC card licenses, credit cards, cash cards, point cards, etc., so that it is used in the same manner as the ID output device 17. be able to. When the communication specifications of the portion corresponding to the physical layer of the OSI reference model of each card are different, it is usually necessary to prepare a different ID reader 12 for each card.

  Furthermore, since the recent mobile phones are multifunctional, there is a possibility that the identification ability can be exhibited in various forms. For example, if the mobile phone 16 is equipped with the mailer and has a function of transmitting an e-mail, The sender mail address can be used as the personal information.

  In addition, biometric authentication that performs authentication based on the physical characteristics of the user U1 itself can be used as alternative authentication. In this case, the user U1 itself becomes the alternative authentication means 17A. For example, biometric authentication can be performed based on the fingerprint, facial appearance, retina pattern, voiceprint, and the like of the user U1.

  In the case where the face of the user U1 is included in the employee ID or license, the alternative authentication using the employee ID or license is substantially similar to biometric authentication using the face. You can also see it.

  Many of the alternative authentication means exemplified here have weaknesses such as weak identification ability, relatively easy counterfeiting, and a large amount of calculation required for authentication processing, but consider the authentication method. It is possible to compensate for this weakness.

  The alternative authentication unit 33 also allows the user U1 to select an alternative authentication means desired by interacting with the user U1 by displaying the screens of FIGS. 10A to 10C on the MMK terminal 14. It also has a function.

  Further, the alternative authentication unit 33 may have a function of previously registering personal information necessary for alternative authentication in the alternative authentication table TB14 in the virtual print server 13.

The operation of this embodiment having the above configuration will be described with reference to the flowchart of FIGS. 5-9.

  The flowchart of FIG. 5 is composed of steps S10 to S34, the flowchart of FIG. 6 is composed of steps S41 to S54, and the flowchart of FIG. 7 is composed of steps S60 to S66. The flowchart of FIG. 8 is composed of steps S70 to S86, and the flowchart of FIG. 9 is composed of steps S90 to S100.

  The flowchart of FIG. 5 shows the flow of processing for registering personal information (image data) for alternative authentication in the alternative authentication table TB14.

  6 to 9 are flowcharts showing the flow of processing when executing alternative authentication using various registered personal information. FIG. 6 uses image data as personal information, and FIG. 7 shows personal information. Using data other than image data (corresponding to the case where personal information such as the IC card license can be easily read), FIGS. 8 and 9 use the sender mail address as personal information.

(A-2) Operation of the First Embodiment The processing in the case of registering the image data such as the employee ID card or license as personal information for alternative authentication is according to FIG. This registration can be performed from the print data registration PC 11 or the like when the print data registration PC 11 has a scanner function or the like, but here it is performed from the MMK terminal 14. In the registration from the MMK terminal 14, the scanner function of the MFP 15 can be utilized. For this registration, the virtual print server 13 can provide various Web pages to the MMK terminal 14.

  In FIG. 5, when the user U1 operates the MMK terminal 14 to display the Web page provided from the virtual print server 13 on the screen, an alternative is displayed on the Web page (for example, the screen shown in FIG. 14A). An alternative authentication registration button for requesting registration of personal information for authentication is arranged. When the user U1 presses this button (S10, S11), a list of authentication means to be registered is displayed, so that the user U1 selects the authentication means on the screen (for example, the screen shown in FIG. 14B). Perform (S12).

  In the case of FIG. 5, step S13 branches into five according to the selection at this time.

  Step S14 is a branch destination when an identification card (such as the above-mentioned license) is selected, and step S19 is a branch destination when a magnetic card or an IC card (such as the above-mentioned IC card license) is selected. S22 is a branching destination when mail is selected, step S25 is a branching destination when one using the camera function of the mobile phone 16 is selected, and step S31 is provisionally only for alternative authentication. This is a branch destination when a temporary ID (user ID) and a temporary PWD (password) to be used are selected.

  This selection may be exclusive, allowing only one authentication means to be selected, but it is also desirable to allow selection of multiple authentication means. In any case, since it is necessary to specify for which user each authentication means has been registered, by inputting in a predetermined input field provided on the web page in the process before step S13, etc. Of course, it is necessary to specify the user ID (for example, IDU1) of the user (here, U1).

  First, the case where the process branches to step S14 will be described.

  In step S <b> 14, a screen (for example, the screen shown in FIG. 14C) including a message for instructing to place the identification card on the glass surface of the MFP 15 is displayed on the display unit of the MMK terminal 14. An OK button is also prepared on this screen. When the user U1 presses the OK button after placing the identification card on the glass surface, the step S15 branches to the Yes side, and the identification is performed by the scanner function of the MFP 15. The certificate image is read (scanned), subjected to image processing, normalized (S16, S17), and the result of the image processing is transmitted to the virtual print server 13.

  Upon receiving this, the virtual print server 13 registers this image data in association with the row of the user ID (IDU1) corresponding to the user U1 in the alternative authentication data of the alternative authentication table TB14 (S18).

  In step S19, the personal information is read by inserting the card into an ID reader (17) or the like (S20). At this time, for each card (IC card license, etc.) When the communication specifications are different, it is necessary to change the ID reader inserted depending on the card used. A message for supporting this change may be displayed on the screen of the MMK terminal 14.

  The read personal information is transmitted to the virtual print server 13 and registered as substitute authentication data in the substitute authentication table TB14 in the same manner as the processing from step S14. This personal information may be a serial number of the card or a credit card number.

  In step S22, a Web page (for example, the screen shown in FIG. 15) having a mail address input field is displayed on the MMK terminal 14, and the user U1 is allowed to input the mail address (mail address of the mobile phone 16) (S23). ). The input mail address is registered in the alternative authentication table TB14 as alternative authentication data (S24).

  In step S25, a QR code for mail transmission is created with the user ID encrypted as the body, the destination as the substitute authentication means registration e-mail address of the virtual print server 13, and the title as registration, and the QR code is included. The web page is transmitted to the MMK terminal 14 (S25). The MMK terminal 14 that has received the message displays a screen corresponding to the Web page (for example, the screen shown in FIG. 16) (S26).

  The user U1 viewing this screen photographs the QR code on the screen with the camera of the mobile phone 16 and sends an e-mail (S27). The destination of this e-mail is the substitute authentication means registration e-mail address.

  When the electronic mail is received (S28), the virtual print server 13 extracts the user ID and registers it in the alternative authentication table TB14 (S29, S30).

  In step S31, a temporary user ID and password are generated on the virtual print server 13 side. The contents of the generated user ID and password are displayed on the MMK terminal 14 and communicated to the user U1 on a screen as shown in FIG. 17, for example (S32). FIG. 17 also displays a temporary user ID and password expiration date.

  If necessary, the user U1 may select or input a temporary user ID and / or password.

  The temporary user ID and password transmitted to the user U1 are registered in the alternative authentication table TB14 as the alternative authentication data (S33).

  When registration of such alternative authentication data is completed, the user U1 can use the virtual print service by alternative authentication whenever necessary, such as when the ID output device 17 is lost. The effect when the result of the alternative authentication is OK may be basically the same as the effect when the result of the main authentication is OK, but if necessary, some restrictions may be imposed. Good. For example, it may be possible to impose restrictions such as not allowing deletion or modification of content stored in the virtual print server 13.

  When the user U1 carries the ID output device 17 and can perform main authentication, the user U1 transmits personal information from the ID output device 17 to the virtual print server 13, and the virtual print server 13 stores the personal information. The main authentication unit 32 performs main authentication.

  Further, the main authentication may be executed by, for example, displaying the screen of FIG. 10A on the MMK terminal 14 and allowing the user U1 to input the user ID and password. In the screen of FIG. 10A, when the user U1 detects that the ID lost button is pressed, the virtual print server 13 provides a Web page corresponding to the screen of FIG. 10B or 10C. It has become. Even when the main authentication uses the ID output device 17, by displaying on the MMK terminal 14 a screen having a dialog part corresponding to the ID lost button, the screen shown in FIG. A screen can be displayed.

  In FIG. 6, alternative authentication based on the image data is performed.

  In FIG. 6, assuming that the user U1 selects one using image data as an authentication means for alternative authentication on the screen shown in FIG. 12A displayed on the MMK terminal 14 (S42), the MMK terminal 14 A question screen (for example, the screen of FIG. 12B or FIG. 12C. This screen corresponds to the screen shown in FIG. 10B or FIG. 10C) is displayed. When the user U1 does not know the answer to the question displayed on the question screen (in the case of branching on the No side in step S44), the user U1 presses a button (other question button) for selecting another question ( (S45), the question screen to be displayed on the screen is reselected (by reselecting, the display screen of the MMK terminal 14 is changed from the screen of FIG. 10B to the screen of FIG. 10C, for example) ( S43), if it is known (in the case of Yes side branch in step S44), an answer to the question is input on the question screen (S46).

  Next, the related information table TB16 is searched using the question and the user U1's answer to the question as a search key, and one or a plurality of user IDs are specified (S47). However, since the number of users registered as members in the virtual print server 13 is enormous, depending on the content of the answer, it is not possible to narrow down to one user ID at this stage, and a plurality of user IDs The possibility of being searched is not small.

  Thereafter, in order to identify one user ID (IDU1 in this case) from among a plurality of user IDs, the alternative authentication unit 33 of the virtual print server 13 uses personal information (substitution authentication data) for alternative authentication. The registered image data is used. Specifically, it is image data such as a license.

  In order to obtain this image data from a user who attempts alternative authentication (for example, U1), a screen as shown in FIG. 12C including a message prompting scanning by the MFP 15 is displayed on the MMK terminal 14 (S48). When the user U1 scans in response to this message (S49), the scanned image data such as a license is delivered to the virtual print server 13 after predetermined image processing (S50) (S51). This image data is used by the alternative authentication unit 33 for user (user ID) specification and alternative authentication (S52).

  If the license is registered in advance as alternative authentication data, the result of the alternative authentication is OK, otherwise it is NG (S53). When the user U1 who is a regular member tries to authenticate, since the license is the same as that registered in advance, an OK authentication result is obtained. When an OK authentication result is obtained, for example, the screen shown in FIG. 24 may be displayed on the MMK terminal 14.

  After the OK authentication result is obtained, the user U1 can receive the virtual print service in accordance with a normal procedure.

  If the image data identification capability is sufficiently high, the image data scanned for authentication and delivered to the virtual print server 13 and the image data previously registered in the virtual print server 13 are collated one by one. Although it is possible to perform authentication, a large amount of calculation is required for collating image data that is large in size and easily mixed with ambiguity. Therefore, it is necessary to execute steps S44 and S46, etc. The image data is collated after narrowing down. As a result, the amount of calculation required for authentication can be significantly reduced.

  Next, in FIG. 7, alternative authentication is performed using data other than image data (corresponding to a case where personal information such as an IC card license can be easily read).

  In FIG. 7, step S61 corresponds to step S42, step S64 corresponds to step S52, and step SS65 corresponds to step S53. Therefore, detailed description thereof is omitted.

  However, the screen displayed on the MMK terminal 14 in step S61 is, for example, as shown in FIG.

  In step S62 following step S61 in FIG. 7, a screen prompting insertion of a card such as the IC card license (for example, the screen in FIG. 11B) is displayed on the MMK terminal 14, and in the next step S63, The personal information output by the card is read by the ID reader 12 corresponding to the card. Thereafter, the processing in step S64 and the like continues.

  8 and 9 both perform alternative authentication by mail address. However, FIG. 8 has a high security level and low convenience, whereas FIG. 9 has a low security level but high convenience.

  Many steps in FIG. 8 correspond to FIG. 6 already described. That is, step S71 in FIG. 8 corresponds to step S42, step S72 corresponds to step S43, step S73 corresponds to step S44, step S74 corresponds to step S45, and step S75 corresponds to the step. Since step S76 corresponds to step S47 and corresponds to step S47, detailed description thereof will be omitted.

  In step S77 following step S76, the alternative authentication unit 33 of the virtual print server 13 encrypts one or a plurality of user IDs specified in step S76 and converts them into character strings. Here, for the convenience of the user U1, it may be encrypted into a character string consisting only of numbers.

  Next, a mail transmission QR code including the following information IT1 to IT3 is created (S78).

IT1: Email address for authentication of the virtual print server 13 as a mail destination (for example, qroot @ x-Service)
IT2: E-mail title (for example, Authentication)
IT3: Mail text However, the result encrypted in step S77 is used for this text.

  In the subsequent step S79, a screen including the QR code created here is displayed on the MMK terminal 14. The content of this screen depends on the processing in step S73, but may be the screen shown in FIG. 13 as an example.

  In FIG. 13, the code CD1 indicates the QR code created in step S78. Further, the description content of the field F1 corresponds to the information IT1, the description content of the field F2 corresponds to the information IT2, and the description content of the field F3 corresponds to the information IT3.

  At this time, since the user U1 is operating the MMK terminal 14 with the camera-equipped mobile phone 16 carried, the user U1 takes a QR code CD1 with the camera according to the message displayed in the screen of FIG. An e-mail is transmitted from the mobile phone 16 (S80). This e-mail is an e-mail having the description of the field F1 on the screen of FIG. 13 as the destination, the description of the field F2 as the title, and the description of the field F3 as the content. In addition, in the e-mail, it is natural that the e-mail address of the mobile phone 16 that is not shown on the screen in FIG. 13 is described as the source e-mail address.

  The e-mail transmitted from the mobile phone 16 is transmitted via the mobile phone network and the Internet, and arrives at the authentication mail address of the virtual print server 13 according to the description in the field F1 (S81).

  The alternative authentication unit 33 of the virtual print server 13 decrypts and extracts one or a plurality of user IDs included in the QR code of the electronic mail (S82, S83), and the extracted one or a plurality of mail addresses, The sender mail address of the electronic mail is checked (S84). If the process of steps S73 and S75 is appropriately performed and the person who sent the e-mail is a regular member, the sender e-mail address matches one of the retrieved e-mail addresses. The result is OK. Otherwise, the authentication result is NG (S85).

  Many steps in FIG. 9 correspond to the steps in FIGS. 7 and 8 already described. That is, step S91 in FIG. 9 corresponds to step S61, step S92 corresponds to step S78, step S93 corresponds to step S79, step S94 corresponds to step S80, and step S95 corresponds to the step. Since it corresponds to S81, its detailed description is omitted.

  However, in the case of FIG. 9, the QR code created in step S92 differs from step S78 in that the user ID is not included.

  Accordingly, the screen displayed on the MMK terminal 14 in step S93 is, for example, the screen shown in FIG.

  Therefore, in the case of the flowchart of FIG. 9, the alternative authentication unit 33 of the virtual print server 13 receives the e-mail from the mobile phone 16 in step S95, and then uses the e-mail address of the e-mail as a search key. The user ID of the user U1 is specified by searching the table TB14 (S96).

  Subsequently, the alternative authentication unit 33 issues a temporary user ID and password for the user U1 and stores the temporary user ID and password in the database DB1 (S97). Transmission is made to the mobile phone 16 (S98).

  Thereafter, the user U1 confirms the provisional user ID and password on the screen of the mobile phone 16, and requests alternative authentication by inputting the user ID and password to the MMK terminal 14 (S99). ). The subsequent procedure may be the same as the authentication (main authentication) using a normal user ID and password.

  Thus, even if the user U1 cannot perform the main authentication due to the loss of the ID output device 17, etc., the user U1 immediately performs the replacement authentication, and if the result of the replacement authentication is OK, the user U1 provides the virtual print service. Can receive.

(A-3) Effects of the First Embodiment According to the present embodiment, even if the main authentication cannot be performed due to the loss of the ID output device (17), the alternative authentication is immediately performed and the alternative authentication is performed. If the result is OK, the provision of the virtual print service can be received, so that the availability and convenience are high.

(B) Second Embodiment Hereinafter, only differences between the present embodiment and the first embodiment will be described. If the ID output device 17 is lost, it can be expected to be misused by a third party, so the related contact information (for example, the business operator operating the virtual print server 13 or a credit card company) It is necessary to take actions such as losing the effectiveness of the ID output device 17 for general users (for example, U1) when there are a plurality of related contacts. It is not always easy to know the actions to be taken properly and actually carry out the actions promptly.

  The present embodiment provides a solution for this problem that was lacking in the first embodiment.

(B-1) Configuration of the Second Embodiment The present embodiment is substantially different from the first embodiment in that it mainly relates to the internal configuration of the virtual print server and the related contact information in the virtual print system. Is limited to points that contain

  An example of the overall configuration of the virtual print system 9 of this embodiment is shown in FIG.

  In FIG. 20, since the functions of the constituent elements to which the same reference numerals 12, 14, 15, 17, DT1, DT2, and DT3 as those in FIG. 3 are applied correspond to the first embodiment, detailed description thereof is omitted.

  However, the MFP 15 according to the present embodiment automatically scans a check box (for example, CB3) that is checked by the user U1 in the printed action list (for example, the action list PA1 shown in FIG. 23). It has a function to contact the contact corresponding to the check point.

  The reference numeral 12 in the present embodiment is preferably a card reader that can read personal information from a credit card or the like, but is a card reader or the ID reader 12 similar to the first embodiment. This is not an essential difference because it is only a difference in the communication specifications of the physical layer described above from the viewpoint of communication. Therefore, the ID output device 17 may be a non-contact IC card that can communicate without contact, or may be a contact-type card that performs reading by being mechanically mounted in a predetermined slot. is not.

  The card company OR1 and the bank OR2 are examples of the related contact information described above. The card company OR1 and the bank OR2 may be contacted by mail or the like, but since immediacy is important to prevent misuse of the lost ID output device 17, for example, facsimile or e-mail It is preferable to use computer communication.

  Personal computers 5 and 6 are also examples of related contacts. In this case as well, communication by computer communication is assumed with emphasis on immediacy. When the personal computer is the destination, facsimile communication using VoIP technology or the like can be used, but it is convenient to use electronic mail.

  The personal computer 5 is used by the user U11, and the personal computer 6 is used by the user U12. Users U11 and U12 are users who have registered content in the virtual print server 13 for the user U1. When the virtual print service does not accept such registration from other than the content use member, the users U11 and U12 are also content use members similar to the user U1. U12 is not necessarily a member of the virtual print service.

  Since it is presumed that the user U1 and the users U11 and U12 are acquainted as long as such content registration is performed, the personal computers 5 and 6 are contacted.

  An example of the internal configuration of the virtual print server 40 of this embodiment is as shown in FIG.

  In FIG. 18, the functions of the components given the same reference numerals 30 to 33 as in FIG. 1 correspond to those in the first embodiment, and thus detailed description thereof is omitted.

  The user behavior corresponding unit 41 in the virtual print server 40 is a characteristic component of the present embodiment, and generates a behavior list PA1 shown in FIG. 23 and transmits it to the MMK terminal 14 in response to a request from the user U1. It is the said user action response part 41 that performs.

  FIG. 21 shows a detailed configuration of a part of the virtual print server 40.

  In FIG. 21, the virtual print server 40 includes a mail receiving unit 50, an information terminal control device 51, a contact receiving unit 52, an automatic telephone device 53, a FAX transmission device 54, a mail transmission unit 55, a database. DB2 is provided.

  Among these, the mail receiving unit 50, the mail transmitting unit 55, the FAX transmitting device 54, and the automatic telephone device 53 mainly correspond to the communication unit 30 in the virtual print server 40.

  The mail transmission unit 55 transmits an electronic mail, the FAX transmission device 54 performs facsimile transmission, and the automatic telephone device 53 automatically makes a telephone call using synthetic voice, thereby contacting the related contact address described above. Is.

  The contact receiving unit 52 is included in the user action handling unit 41 in the virtual print server 40 and receives the related contact. This reception is basically performed by an explicit request from the user U1, but may be automatically executed based on the usage history of the virtual print service of the user U1 if necessary.

  The database DB2 corresponds to the database DB1 of the first embodiment, and details thereof are as shown in FIG.

  FIG. 22 is an ER diagram of the same format as FIG. 4 used in the first embodiment.

  FIG. 22 includes tables (relational tables) TB21 to TB31.

  Of these, for example, by searching the card company table TB22, information (address, telephone number, e-mail address, HP (URL), etc.) necessary for contacting the card company can be specified. Here, HP is a data item that describes a URL for contact when the card company provides a homepage for contact using a Web server.

  The important contact table TB23 is a table in which important contacts for the user U1 are registered, and is created by the user U1 himself using a Web page provided by the virtual print server 40 or the like.

  The contact table TB26 is a table in which contacts necessary for the user U1 are registered. Like the important contact table TB23, the contact table TB26 is created by the user U1 himself using a Web page provided by the virtual print server 40. As an example, it is also easy to obtain the registered contents of the contact table TB26 related to the user U1 by uploading the contents of the address book registered by the user U1 to the PIM software on the personal computer 7.

  The registered contents of the payment history table TB24 are automatically added when the user U1 uses the virtual print service or other services (such as a credit card).

  The document registration history table TB25 is given the email address of the user who registered the document (content) by email. By examining the document history table TB25, the user (for example, U11) who registered the content for the user U1 can be specified.

  Further, according to the action list table TB31, the registered contents of the tables TB21 to TB30 relating to a certain user (U1 in this case) can be searched based on the user ID as the external key.

The operation of this embodiment having the above configuration will be described with reference the flowchart of FIGS. 25 27.

  The flowchart of FIG. 25 is composed of steps P10 to P19, the flowchart of FIG. 26 is composed of steps P20 to P27, and the flowchart of FIG. 27 is composed of steps P30 to P58. .

  The flowchart of FIG. 25 shows the flow of processing when printing out an action list (for example, PA1 of FIG. 23), and the flowchart of FIG. 26 is the flow of processing when generating an important action list or the like in the virtual print server 40. The flowchart of FIG. 27 shows the flow of processing when automatically contacting the related contact address.

(B-2) Operation of the second embodiment
The flowchart of FIG. 25 is started when a print request message for requesting printout of an action list arrives from the user U1. The print request message may be transmitted from the mobile phone 16, but here it is transmitted from the MMK terminal 14. For example, when the ID output device 17 is lost, the user U1 transmits the print request message. An operator who operates the virtual print server 40 and provides a virtual print service can recognize the loss of the ID output device 17 only by receiving such a print request message.

  Upon receiving such a print request message, the virtual print server 40 issues a list ID for printing out the action list PA1 (P11). At the time of issuance, this list ID is in a plain text state, but is QR-coded to be placed as the QR code CD11 at the top of the action list PA1 shown in FIG. 23 later (P12).

  In subsequent steps P13 to P16, an important behavior list, a payment history behavior list, a registration history behavior list, and a contact behavior list regarding the user U1 are created.

  Among them, the important behavior list is created based on the registered content of the important behavior list table TB27, the payment history behavior list is created based on the registered content of the payment history behavior list table TB28, and the registered history behavior list is the registration history. The contact action list is created based on the registration contents of the history action list table TB29, and the contact action list is created based on the registration contents of the contact action list table TB30. Details of these creation procedures will be described later.

  When each action list is created in steps P13 to P16, their layout is determined in step P18.

  Thereafter, the contents of each action list having a determined layout are transmitted from the virtual print server 40 to the MMK terminal 14 and printed out from the MFP 15 via the MMK terminal 14. Here, what is printed out is, for example, the action list PA1 of FIG. 23 described above.

  FIG. 26 shows a detailed procedure for creating each action list. Since the procedure for creating the important behavior list, the payment history behavior list, the registration history behavior list, and the contact behavior list is substantially the same, FIG. 26 will be described using the important behavior list as an example.

In Figure 26, first, create a child is determined important behavior list, the user ID is identified (P21).

  If the user ID can be specified, one or a plurality of lines corresponding to the user ID can be specified from the important contact table TB23, and a list composed of the lines (elements) can be obtained. The position is determined (P23), the contact content is determined (P24), and the operation of storing in the database is repeated (P22 to P26). This database may be a table included in a part of the database DB2. The mark position refers to the position of the check box. At the time of scanning by the MFP 15 described above, it is detected whether or not a check is entered at this mark position.

  Details of the procedure when the MFP 15 scans the action list PA1 printed out from the MFP 15 and automatically transmits it to the related contact are as shown in FIG. Prior to the execution of the flowchart of FIG. 27, the user U1 enters a check in a desired check box among the check boxes CB1 to CB13 on the action list PA1.

  In FIG. 27, after the check is entered, when the action list PA1 placed on the glass surface is scanned, first, the MFP 15 decodes and acquires the list ID from the QR code CD11 (P31). Is acquired (P32, P33). The action method is a specific communication contact means. For example, whether to use a facsimile or e-mail is acquired here. The action content is a destination of communication by the contact means (for example, a facsimile number or a destination mail address).

  If the action contents can be corrected as appropriate, the user U1 corrects the contents of the action list PA1 by displaying it on the MMK terminal 14 before printing out and editing the contents, if necessary. (P34).

  The tables PB1 to PB5 on the action list PA1 may basically be processed in any order, but strictly speaking, the earlier the processing, the earlier the order in which contact is performed, so the lost ID output It is good to process in order with a big influence when the apparatus 17 is abused. In the flowchart of FIG. 27, the important action list is first processed after scanning. The important behavior list is the table PB1 on the behavior list PA1 (P35).

  In the important behavior list processing, the mark position (that is, the position of the check boxes CB1 and CB2) in the table PB1 is specified, and whether or not it is checked (whether or not it is marked) is determined by OMR (P36). ). If none of the check boxes are checked, the processing relating to the table PB1 is completed, but if checked, the relevant contact information (for example, the corresponding card company) corresponding to the check box is contacted (P38).

  The same applies to the payment history action list (table PB2) in steps P40 to P44, the registration history action list (table PB3) in steps P45 to P49, and the contact action list (table PB4) in steps P50 to P57. The details are almost the same as in the case of the important action list. If it is checked, the relevant contact is contacted. If not, the details are not explained. Omitted.

  However, in the case of the table TB4 corresponding to the contact address action list, since there are more contact means than other tables (for example, PB1), three branch destinations (mail (P54), telephone (P55), facsimile (FAX) are sent in step P53. ) (P56)) can be selected.

  Here, the action list PA1 is printed out. However, without printing out, the user U1 uses the editing function of the MMK terminal 14 to perform an operation corresponding to filling in the check in the check box. Upon receiving the result, the MFP 15 or the MMK terminal 14 may contact each related contact address.

  Since a lot of personal information about the user U1 is described in the action list PA1, it is necessary to consider disposal of the action list PA1 after scanning in order to prevent leakage of personal information. Such a thing disappears.

(B-3) Effect of Second Embodiment According to the present embodiment, an effect equivalent to the effect of the first embodiment can be obtained.

  In addition, in this embodiment, even when the ID output device (17) is lost, the user (U1) knows the action to be taken appropriately and can actually perform the action quickly with very little effort. Can be convenient, and security is improved.

(C) Third Embodiment Hereinafter, only the points of this embodiment different from the first and second embodiments will be described.

For example, after the lost ID output device 17 is lost, for example, the user ID or password output from the ID output device 17 is lost, the ID output device 17 returns to the user U1. In such a case, there is a high possibility that processing (that is, resumption processing) such as restoring the effectiveness of the ID output device 17 and validating the user ID or password is necessary. be efficiently perform complicated procedures required are not always easy for a general user (e.g., U1).

  This embodiment provides a solution for this problem that was lacking in the first and second embodiments.

(C-1) Configuration and Operation of Third Embodiment The present embodiment is different from the second embodiment only in the point relating to the internal configuration of the virtual print server. The internal configuration of the virtual print server 50 of this embodiment is as shown in FIG. 19, for example.

  In FIG. 19, since the function of each component given the same reference numerals 30 to 34 and 41 as FIG.

  The restart processing unit 51 in the virtual print server 50 is a characteristic component of the present embodiment, and the operations shown in FIGS. 28 and 29 described below are mainly realized by the function of the restart processing unit 51.

The flowchart of FIG. 29 is composed of the steps of P60~P70, it shows a process relating to such determination of the conditions for starting the restart process described above predicate.

  29, a restart method selection screen (for example, the screen shown in FIG. 28A) is displayed on the MMK terminal 14, and the user U1 is allowed to select a condition (restart method) for starting the restart process (P61, P62). ). In the example of FIG. 28A, a restart period and a restart password (restart password) are prepared as a restart method. The resumption period starts automatically when the resumption period specified in advance by the user U1 has elapsed. The resumption password is entered by the user U1 at any time by inputting the password. be able to.

  When the user U1 presses the restart period input button on FIG. 28A, the process proceeds to step P63, and the display screen changes to that shown in FIG. In the screen of FIG. 28B, a field F31 for inputting a date for starting the restart process is prepared. Although it is considered rare to be used due to the nature of the restart process, a field F32 for designating a date on which the user ID or password recovered by the restart process is revoked is provided on the screen. It has been.

  The contents entered in these fields F31 and F32 are registered and stored in the database in a form associated with IDU1 which is the user ID of the user U1 in the virtual print server 50. However, even after the user ID is revoked, at least inside the virtual print server 50, almost all data relating to the user U1 is registered and managed in association with the user ID. Of course, the value needs to be stored. The revocation of the user ID means that when access using the user ID is attempted to the virtual print server 50 from the outside, a negative response such as refusal is performed for the access.

  On the other hand, when the restart password is selected in step P62, that is, when the user U1 presses the restart password button on the screen of FIG. 28A, the restart processing unit 51 in the virtual print server 50 restarts. A password for use is issued (P65), and the restart password is transmitted to the user U1 via, for example, the screen shown in FIG. However, the resumption password may not be issued unilaterally from the virtual print server 50 side, but may be described or selected by the user U1.

  In any case, it is necessary to save the contents of the restart password in a database in the virtual print server 50.

  When the user U1 presses the post-mail stop button on the screen of FIG. 28C, the resumption password is described in the e-mail and sent to the user U1's personal computer (for example, 7) or the mobile phone 16 or the like. If the stop button is pressed after printing (P68), printing is output from the MFP 15 or a receipt printer not shown (P69). Such an e-mail or print output is effective for the user U1 to securely save the contents of the resumption password and to be able to reuse it when desiring to start the resumption process.

  However, when the user U1 can be surely memorized by his / her brain, it is not necessary, so the user U1 presses the stop button on the screen of FIG. 28C and the flowchart of FIG. Can also be terminated. If stored in the brain of the user U1 himself, the possibility that the password is known to a third party is the lowest and the security is high.

  As described above, when the user U1 selects the restart date as the restart method in the selection in step P62, the virtual print server 50 automatically restarts when the restart period specified in advance by the user U1 has elapsed. To start. Further, when the resuming password is selected as the resuming method, the user U1 can start the resuming process at any time by inputting the resuming password from the MMK terminal 14 and transmitting it to the virtual print server 50, for example. it can.

(C-2) Effect of Third Embodiment According to the present embodiment, an effect equivalent to the effect of the second embodiment can be obtained.

  In addition, in the present embodiment, the restart process can be started very efficiently, and the operation burden on the user is small.

  For example, when the resumption date is selected as the resumption method, the resumption process is automatically started after the resumption date, even if the user (U1) does not perform any special procedure. When the resumption password is selected as the resumption method, the user (U1) can start the resumption process at a desired timing simply by inputting the resumption password.

(D) Other Embodiments In the first to third embodiments described above, content use members (that is, users) are targeted. However, the present invention may be able to target content providing members.

  This is because there is a possibility that a contactless IC card or the like can also be used for management of content providing members.

  Naturally, the features of the embodiments can be combined in combinations other than those shown in the first to third embodiments. For example, it is possible to configure a virtual print server that does not have the user action response unit 41 but has the restart processing unit 51.

  Further, as the ID output device 17, for example, the mobile phone 16 can be used. This is because some mobile phones 16 are equipped with an infrared communication function and a short-range wireless communication function, and it is possible to deliver personal information to the ID reader 12 with such a function.

  In the above description, the present invention is realized mainly by hardware, but the present invention can also be realized by software.

  It should be noted that the program having the functions such as the virtual print server described above can be stored in a storage medium (for example, a CD-ROM).

It is the schematic which shows the example of an internal structure of the virtual print server used by 1st Embodiment. It is the schematic which shows the example of internal structures of the mobile telephone etc. which are used in the 1st-3rd embodiment. 1 is a schematic diagram illustrating an example of the overall configuration of a virtual print system according to a first embodiment. It is an ER figure which shows the structural example of the database used by 1st Embodiment. It is a flowchart which shows the operation example of 1st-3rd embodiment. It is a flowchart which shows the operation example of 1st-3rd embodiment. It is a flowchart which shows the operation example of 1st-3rd embodiment. It is a flowchart which shows the operation example of 1st-3rd embodiment. It is a flowchart which shows the operation example of 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the structural example of the display screen in 1st-3rd embodiment. It is the schematic which shows the internal structural example of the virtual print server used by 2nd Embodiment. It is the schematic which shows the example of an internal structure of the virtual print server used by 3rd Embodiment. It is the schematic which shows the example of whole structure of the virtual printing system which concerns on 2nd Embodiment. It is the schematic which shows the detailed structural example regarding a part of virtual print server used by 2nd Embodiment. It is an ER figure which shows the structural example of the database used by 2nd Embodiment. It is the schematic which shows the structural example of the action list printed out by 2nd Embodiment. It is the schematic which shows the structural example of the display screen in 2nd Embodiment. It is a flowchart which shows the operation example of 2nd and 3rd embodiment. It is a flowchart which shows the operation example of 2nd and 3rd embodiment. It is a flowchart which shows the operation example of 2nd and 3rd embodiment. It is the schematic which shows the structural example of the display screen in 3rd Embodiment. It is a flowchart which shows the operation example of 3rd Embodiment.

Explanation of symbols

  DESCRIPTION OF SYMBOLS 10 ... Virtual print system, 11 ... Print data registration PC, 12 ... ID reader, 13, 40, 50 ... Virtual print server, 14 ... MMK terminal, 15 ... MFP, 16 ... Mobile phone, 17 ... ID output device, 17A: alternative authentication means, 20, 30 ... communication unit, 21, 31 ... control unit, 24, 34 ... storage unit, 22 ... operation unit, 23 ... display unit, 32 ... main authentication unit, 33 ... alternative authentication unit, 41 ... user action response part, 51 ... resumption processing part.

Claims (4)

  1. The content specified by the user is stored in the content storage unit, and at the time of content output request from the user, the main authentication means captures the main authentication information from the user in a method predetermined for the main authentication, In the information storage server that executes the service for providing the content to the user via the content output terminal, when the main authentication is performed to collate with the internal authentication information that is internally managed and a positive authentication result is obtained,
    Alternative authentication information can be executed by taking alternative authentication information from a user in a predetermined method for alternative authentication and executing alternative authentication that is collated with internally managed alternative authentication information, or A plurality of alternative authentication means with different methods for capturing alternative authentication information from users;
    When the user makes an output request, when the user selects to use any of the alternative authentication means instead of the main authentication means, the selected alternative authentication means is authenticated as valid instead of the main authentication means. and the alternative authentication selecting means for,
    When the main authentication means revokes the main authentication information used in the main authentication, a release condition designating means for designating a release condition including at least a start date and time for canceling the revocation and information to be input when canceling the revocation information; ,
    Revocation cancellation means for canceling the revocation status of the main authentication information when the release condition is satisfied;
    Information storage servers, comprising the.
  2. The information storage server according to claim 1,
    The main authentication means captures the main authentication information from a portable information holding means portable by the user,
    Contact information storage means for storing at least one or more contact information including contact details and contact method information for a contact that may be determined to be required by the user when the portable information holding means is lost When,
    When the user requests a series of output of contacts, a list of all contacts stored in the contact information storage means is formed and presented to the user to be contacted. A contact list presenting means for the user to select;
    Automatic contact means for automatically contacting the contact information that the user wishes to contact with the contact content stored in the contact method stored in the contact information storage means; Information storage server.
  3. An information storage program installed in a computer constituting an information storage server that stores a content specified by a user and provides a service for transmitting the content to a content output terminal in response to an output request from the user,
    The computer,
    Main authentication means for fetching main authentication information from a user in a predetermined method for main authentication and executing main authentication to collate with the internally managed main authentication information;
    Alternative authentication information can be executed by taking alternative authentication information from a user in a predetermined method for alternative authentication and executing alternative authentication that is collated with internally managed alternative authentication information, or A plurality of alternative authentication means with different methods for capturing alternative authentication information from users;
    When the user makes an output request, when the user selects to use any of the alternative authentication means instead of the main authentication means, the selected alternative authentication means is authenticated as valid instead of the main authentication means. and the alternative authentication selecting means for,
    When the main authentication means revokes the main authentication information used in the main authentication, a release condition designating means for designating a release condition including at least a start date and time for canceling the revocation and information to be input when canceling the revocation information; ,
    Wherein when the release condition is satisfied, information storage program for causing to function as an expired canceling means for canceling the revocation status of the main authentication information.
  4. In the information storage program of Claim 3 ,
    The main authentication means captures the main authentication information from a portable information holding means portable by the user,
    Said computer further
    Contact information storage means for storing at least one or more contact information including contact details and contact method information for a contact that may be determined to be required by the user when the portable information holding means is lost When,
    When the user requests a series of output of contacts, a list of all contacts stored in the contact information storage means is formed and presented to the user to be contacted. A contact list presenting means for the user to select;
    The contact function that the user desires to contact is made to function as an automatic contact means for automatically contacting the contact contents stored in the contact method stored in the contact information storage means. Information storage program.
JP2003366574A 2003-10-27 2003-10-27 Information storage server and information storage program Expired - Fee Related JP4646509B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2003366574A JP4646509B2 (en) 2003-10-27 2003-10-27 Information storage server and information storage program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2003366574A JP4646509B2 (en) 2003-10-27 2003-10-27 Information storage server and information storage program
US10/972,647 US20050091490A1 (en) 2003-10-27 2004-10-26 Information storage server and information storage program

Publications (2)

Publication Number Publication Date
JP2005128970A JP2005128970A (en) 2005-05-19
JP4646509B2 true JP4646509B2 (en) 2011-03-09

Family

ID=34510244

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2003366574A Expired - Fee Related JP4646509B2 (en) 2003-10-27 2003-10-27 Information storage server and information storage program

Country Status (2)

Country Link
US (1) US20050091490A1 (en)
JP (1) JP4646509B2 (en)

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8032608B2 (en) * 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for imaging device notification access control
US8115946B2 (en) * 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and sytems for imaging device job definition
US8120798B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for providing access to remote, descriptor-related data at an imaging device
US7970813B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration and subscription
US8032579B2 (en) * 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device notification access control
US8001586B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management and authentication
US8049677B2 (en) * 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display element localization
US7920101B2 (en) 2004-10-08 2011-04-05 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display standardization
US8120799B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for accessing remote, descriptor-related data at an imaging device
US8213034B2 (en) 2004-10-08 2012-07-03 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access on an imaging device
US8051125B2 (en) * 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device event notification subscription
US7969596B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document translation
US8115947B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for providing remote, descriptor-related data to an imaging device
US7633644B2 (en) * 2004-10-08 2009-12-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device job management
US8115944B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for local configuration-based imaging device accounting
US8006176B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging-device-based form field management
US8015234B2 (en) 2004-10-08 2011-09-06 Sharp Laboratories Of America, Inc. Methods and systems for administering imaging device notification access control
US8006293B2 (en) * 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential acceptance
US7873553B2 (en) 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for authorizing imaging device concurrent account use
US8237946B2 (en) 2004-10-08 2012-08-07 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server redundancy
US7684074B2 (en) 2004-10-08 2010-03-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device metadata management
US7934217B2 (en) 2004-10-08 2011-04-26 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access to an imaging device
US8120793B2 (en) * 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for displaying content on an imaging device
US8060921B2 (en) 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential authentication and communication
US8001183B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device related event notification
US8065384B2 (en) 2004-10-08 2011-11-22 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification subscription
US8018610B2 (en) 2004-10-08 2011-09-13 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote application interaction
US7738808B2 (en) 2004-10-08 2010-06-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device concurrent account use with remote authorization
US8060930B2 (en) * 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential receipt and authentication
US8023130B2 (en) 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data maintenance
US7870185B2 (en) 2004-10-08 2011-01-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration
US8120797B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for transmitting content to an imaging device
US8171404B2 (en) 2004-10-08 2012-05-01 Sharp Laboratories Of America, Inc. Methods and systems for disassembly and reassembly of examination documents
US8125666B2 (en) * 2004-10-08 2012-02-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document management
US8051140B2 (en) * 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device control
US8001587B2 (en) * 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management
US8156424B2 (en) 2004-10-08 2012-04-10 Sharp Laboratories Of America, Inc. Methods and systems for imaging device dynamic document creation and organization
US8115945B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for imaging device job configuration management
US8035831B2 (en) 2004-10-08 2011-10-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote form management
US8006292B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission and consolidation
US8384925B2 (en) 2004-10-08 2013-02-26 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data management
US8024792B2 (en) * 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission
US7873718B2 (en) * 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server recovery
US8230328B2 (en) * 2004-10-08 2012-07-24 Sharp Laboratories Of America, Inc. Methods and systems for distributing localized display elements to an imaging device
US7978618B2 (en) 2004-10-08 2011-07-12 Sharp Laboratories Of America, Inc. Methods and systems for user interface customization
US7826081B2 (en) * 2004-10-08 2010-11-02 Sharp Laboratories Of America, Inc. Methods and systems for receiving localized display elements at an imaging device
US7966396B2 (en) 2004-10-08 2011-06-21 Sharp Laboratories Of America, Inc. Methods and systems for administrating imaging device event notification
JP4510600B2 (en) * 2004-11-19 2010-07-28 京セラミタ株式会社 User authentication program and user authentication device
US8428484B2 (en) 2005-03-04 2013-04-23 Sharp Laboratories Of America, Inc. Methods and systems for peripheral accounting
JP2007087315A (en) * 2005-09-26 2007-04-05 Oki Electric Ind Co Ltd Automatic transaction system
US20070077405A1 (en) * 2005-09-30 2007-04-05 Basf Corporation Inorganic/organic-filled styrenic thermoplastic door skins
JP2007108973A (en) * 2005-10-13 2007-04-26 Eath:Kk Authentication server device, authentication system and authentication method
EP1898333A4 (en) * 2005-12-09 2009-09-23 Hitachi Software Eng Authentication system and authentication method
JP2008015707A (en) * 2006-07-04 2008-01-24 Fuji Electric Systems Co Ltd Information providing system, on-street terminal for it, and program
US8345272B2 (en) 2006-09-28 2013-01-01 Sharp Laboratories Of America, Inc. Methods and systems for third-party control of remote imaging jobs
EP2169585A4 (en) * 2007-07-11 2012-06-06 Fujitsu Ltd User authentication judging device, user authentication judging system, user authentication judging program and user authentication judging method
JP2009083323A (en) * 2007-09-28 2009-04-23 Fujifilm Corp Printing system and printing method
JP5014074B2 (en) * 2007-11-12 2012-08-29 株式会社リコー Multi-function input / output device
US8127363B2 (en) 2007-12-26 2012-02-28 Intel Corporation Method and apparatus for booting a processing system
JP5272445B2 (en) * 2008-02-28 2013-08-28 富士通株式会社 Biometric authentication system, biometric authentication method, and biometric authentication program
JP5458400B2 (en) * 2008-04-15 2014-04-02 株式会社メイクソフトウェア Photo sticker creating apparatus and image providing server
JP5381329B2 (en) * 2009-05-26 2014-01-08 株式会社リコー Image forming apparatus, authentication system, authentication control method, and authentication control program
US8239924B2 (en) * 2009-10-14 2012-08-07 Pitney Bowes Inc. Method and system for authenticating a user based on a physical object
JP2012194736A (en) * 2011-03-16 2012-10-11 Ms&Ad Research Institute Co Ltd Accident report preparation support system
JP5776412B2 (en) * 2011-07-28 2015-09-09 富士ゼロックス株式会社 service providing apparatus, service providing system, and program
JP2014002716A (en) * 2012-05-24 2014-01-09 Buffalo Inc Information processing apparatus, network system, data sharing method, and computer program allowing data sharing
US9235696B1 (en) * 2012-07-11 2016-01-12 Trend Micro Incorporated User authentication using a portable mobile device
JP6223009B2 (en) * 2013-06-19 2017-11-01 キヤノン株式会社 Image forming apparatus, control method therefor, and program
CN105279541A (en) * 2014-03-18 2016-01-27 赵彦杰 Identity card for preventing identity personation
US10282535B2 (en) * 2014-09-02 2019-05-07 NXT-ID, Inc. Method and system to validate identity without putting privacy at risk
US10298593B2 (en) * 2017-06-13 2019-05-21 Live Nation Entertainment, Inc. Systems and methods for big-data resource management

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09198351A (en) * 1996-01-17 1997-07-31 Matsushita Electric Ind Co Ltd User authentication device
JP2001167053A (en) * 1999-12-08 2001-06-22 Nec Corp User authentication device using biometrics and user authentication method used for the same
JP2002032694A (en) * 2000-07-19 2002-01-31 Nec Corp Handling stopping system in the case of losing card
JP2002157050A (en) * 2000-11-17 2002-05-31 Nec System Technologies Ltd Computer automatic recognition system by ic card
JP2003132023A (en) * 2001-10-24 2003-05-09 Toshiba Corp Personal authentication method, personal authentication device and personal authentication system
JP2003157206A (en) * 2001-11-21 2003-05-30 Nec Corp System and method for distributing information and program
JP2003233775A (en) * 2002-02-08 2003-08-22 Hitachi Ltd Ic card information management device
JP2003281366A (en) * 2002-03-20 2003-10-03 Mitsubishi Denki Information Technology Corp Method for identifying user in financial institution

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6226743B1 (en) * 1998-01-22 2001-05-01 Yeda Research And Development Co., Ltd. Method for authentication item
US6651168B1 (en) * 1999-01-29 2003-11-18 International Business Machines, Corp. Authentication framework for multiple authentication processes and mechanisms
JP4321944B2 (en) * 2000-04-27 2009-08-26 富士通株式会社 Personal authentication system using biometric information
GB2369213B (en) * 2000-07-04 2005-02-23 Honda Motor Co Ltd Electronic file management system
US7941669B2 (en) * 2001-01-03 2011-05-10 American Express Travel Related Services Company, Inc. Method and apparatus for enabling a user to select an authentication method
US20020099784A1 (en) * 2001-01-25 2002-07-25 Tran Trung M. System and method for storing and retrieving bookmark information
US20030208439A1 (en) * 2002-05-03 2003-11-06 Rast Rodger H. Automated soft limit control of electronic transaction accounts

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09198351A (en) * 1996-01-17 1997-07-31 Matsushita Electric Ind Co Ltd User authentication device
JP2001167053A (en) * 1999-12-08 2001-06-22 Nec Corp User authentication device using biometrics and user authentication method used for the same
JP2002032694A (en) * 2000-07-19 2002-01-31 Nec Corp Handling stopping system in the case of losing card
JP2002157050A (en) * 2000-11-17 2002-05-31 Nec System Technologies Ltd Computer automatic recognition system by ic card
JP2003132023A (en) * 2001-10-24 2003-05-09 Toshiba Corp Personal authentication method, personal authentication device and personal authentication system
JP2003157206A (en) * 2001-11-21 2003-05-30 Nec Corp System and method for distributing information and program
JP2003233775A (en) * 2002-02-08 2003-08-22 Hitachi Ltd Ic card information management device
JP2003281366A (en) * 2002-03-20 2003-10-03 Mitsubishi Denki Information Technology Corp Method for identifying user in financial institution

Also Published As

Publication number Publication date
US20050091490A1 (en) 2005-04-28
JP2005128970A (en) 2005-05-19

Similar Documents

Publication Publication Date Title
EP2220840B1 (en) Method of authentication of users in data processing systems
US8881251B1 (en) Electronic authentication using pictures and images
JP5133248B2 (en) Offline authentication method in client / server authentication system
AU2008347346B2 (en) Method for reading attributes from an ID token
JP5585969B2 (en) Method, program and computer system for reading attribute from ID token
JP2004276271A (en) Image formation device
US7712675B2 (en) Physical items for holding data securely, and methods and apparatus for publishing and reading them
US8060918B2 (en) Method and system for verifying identity
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
US5987232A (en) Verification server for use in authentication on networks
EP1026641A1 (en) Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal
US7552467B2 (en) Security systems for protecting an asset
JP2004013744A (en) Issuing system for digital content and issuing method
US7086085B1 (en) Variable trust levels for authentication
CN103488438B (en) Information processing system and information processing method
US20060015358A1 (en) Third party authentication of an electronic transaction
US20050022122A1 (en) Document collection manipulation
US20020073213A1 (en) Apparatus for outputting individual authentication information
EP1238321B1 (en) Method and system for generating a secure electronic signature
US20020087892A1 (en) Authentication method and device
US20020058536A1 (en) Mobile phone
JPWO2005024645A1 (en) Information processing server and information processing method
JP3361661B2 (en) Authentication method on the network
KR100437949B1 (en) Digital signature or digital imprint of seal certification system, certification mark management method
EP1102205A1 (en) Signature system for presenting user signature information

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20061006

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20091020

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20091221

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20100921

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20101117

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20101207

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20101207

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20131217

Year of fee payment: 3

LAPS Cancellation because of no payment of annual fees